El cambio es prolífico en los entornos de TI de las organizaciones. Los activos de hardware cambian. Los programas de software cambian. Los estados de configuración cambian. Algunas de estas modificaciones están autorizadas en la medida en que se produ…
Tag: SCM
Security Bloggers, Security Vendor News
What Is FIM (File Integrity Monitoring)?
by David Bisson •
Change is prolific in organizations’ IT environments. Hardware assets change. Software programs change. Configuration states change. Some of these modifications are authorized insofar as they occur during an organization’s regular patching cycle, while…
Europe, Global Security News, North America
What Is Log Management and Why you Need it
by David Bisson •
To remain competitive in the digital age, organizations frequently introduce new hardware devices and software installations to their IT environments. The problem is that these assets might suffer from vulnerabilities that attackers could misuse, if un…